Common use of Lack of Token Security Clause in Contracts

Lack of Token Security. The Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the token smart contract which creates the Tokens or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Tokens, the loss of ability to access or control the Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of the Tokens are not guaranteed any remedy, refund or compensation.

Appears in 3 contracts

Samples: Causevest Coin – Agreement, Token Agreement, Token Sale Agreement

AutoNDA by SimpleDocs

Lack of Token Security. The Tokens may be subject to expropriation and or/and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with the token Token smart contract which creates the Tokens or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Tokens, the loss of ability to access or control the Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of the Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Token Sale Agreement

Lack of Token Security. The Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the token smart contract which creates the Tokens Token Smart Contract or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control the Buyer’s Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of the Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: tokenstars.com

Lack of Token Security. The The​ Tokens may be subject to expropriation and or/and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with the token Token smart contract which creates the Tokens or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Tokens, the loss of ability to access or control the Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of the Tokens are not guaranteed guaranteed​​ any remedy​​remedy, refund or compensation​​refund ​​or ​​compensation.

Appears in 1 contract

Samples: Token Sale Agreement

AutoNDA by SimpleDocs

Lack of Token Security. The Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the token smart contract which creates the Tokens Token Smart Contracts or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Acquiror’s Tokens, the loss of Acquiror’s ability to access or control the Acquiror’s Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of the Tokens are not guaranteed any remedy, refund return or compensation.

Appears in 1 contract

Samples: Tokens Acquisition Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!